www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-04-29T14:45:00+00:00 www.secnews.physaphae.fr Malwarebytes Labs - MalwarebytesLabs Huge breach affects 9 million Cathay Pacific customers Airline company Cathay Pacific revealed that a huge breach took place in March 2018, affecting around 9 million customers. We take a look at some of the potential fallout. Categories: Cybercrime Privacy Tags: (Read more...) ]]> 2018-10-25T17:57:02+00:00 https://blog.malwarebytes.com/cybercrime/2018/10/huge-breach-affects-9-million-cathay-pacific-customers/ www.secnews.physaphae.fr/article.php?IdArticle=862983 False None None None Malwarebytes Labs - MalwarebytesLabs Sextortion emails: They\'re probably not watching you Read more...) ]]> 2018-10-25T15:00:00+00:00 https://blog.malwarebytes.com/101/2018/10/sextortion-emails-theyre-probably-not-watching/ www.secnews.physaphae.fr/article.php?IdArticle=862631 False None None None Malwarebytes Labs - MalwarebytesLabs Exploit kits: fall 2018 review With a fresh exploit kit in town, the drive-by download landscape shows new signs of life in fall 2018. Categories: Exploits Threat analysis Tags: (Read more...) ]]> 2018-10-24T16:10:05+00:00 https://blog.malwarebytes.com/threat-analysis/2018/10/exploit-kits-fall-2018-review/ www.secnews.physaphae.fr/article.php?IdArticle=860713 False None None None Malwarebytes Labs - MalwarebytesLabs Mac malware intercepts encrypted web traffic for ad injection New Mac malware has been found that intercepts encrypted traffic for the purpose of injecting ads into web pages. But could this adware be used for more devious purposes in the future? Categories: Mac Threat analysis Tags: (Read more...) ]]> 2018-10-24T15:00:04+00:00 https://blog.malwarebytes.com/threat-analysis/2018/10/mac-malware-intercepts-encrypted-web-traffic-for-ad-injection/ www.secnews.physaphae.fr/article.php?IdArticle=860552 False Malware None None Malwarebytes Labs - MalwarebytesLabs Compromising vital infrastructure: how voting machines and elections are vulnerable What are our options for secure and honest election results? Should we be using voting machines or are there better alternatives? Categories: Cybercrime Hacking Tags: (Read more...) ]]> 2018-10-23T12:00:00+00:00 https://blog.malwarebytes.com/cybercrime/2018/10/compromising-vital-infrastructure-voting-machines-elections-vulnerable/ www.secnews.physaphae.fr/article.php?IdArticle=858432 False None None None Malwarebytes Labs - MalwarebytesLabs A week in security (October 15 – 21) A roundup of the security news from October 15–21, including how to build your own security camera, the FIDO standard, Twitter information operations, and our Q3 CTNT report. Categories: Security world Week in security Tags: (Read more...) ]]> 2018-10-22T16:23:01+00:00 https://blog.malwarebytes.com/security-world/2018/10/a-week-in-security-october-15-21/ www.secnews.physaphae.fr/article.php?IdArticle=856712 False None APT 32 None Malwarebytes Labs - MalwarebytesLabs Information operations on Twitter: new data released on election tampering New information released by Twitter sheds fresh light on the various professional troll campaigns deployed alongside the 2016 presidential elections. Categories: Cybercrime Social engineering Tags: (Read more...) ]]> 2018-10-18T15:00:00+00:00 https://blog.malwarebytes.com/cybercrime/2018/10/information-operations-twitter-new-data-released/ www.secnews.physaphae.fr/article.php?IdArticle=853661 False None None None Malwarebytes Labs - MalwarebytesLabs Is FIDO the future instrument to prove our identity? FIDO, which stands for Fast Identity Online, is set of standards that enable simpler and more secure user authentication across websites and mobile services. Does this mean the end of passwords? Time will tell. Categories: Security world Technology Tags: (Read more...) ]]> 2018-10-17T16:52:00+00:00 https://blog.malwarebytes.com/security-world/2018/10/fido-future-instrument-prove-identity/ www.secnews.physaphae.fr/article.php?IdArticle=852156 False None None None Malwarebytes Labs - MalwarebytesLabs How to build your own motion-activated security camera Attention makers! Are you looking for a challenging project that not only gets your gears grinding but helps to keep you secure while traveling? Welcome to the build-your-own security camera tutorial. Categories: Security world Technology Tags: (Read more...) ]]> 2018-10-16T15:00:00+00:00 https://blog.malwarebytes.com/security-world/2018/10/how-to-build-your-own-motion-activated-security-camera/ www.secnews.physaphae.fr/article.php?IdArticle=850195 False None None None Malwarebytes Labs - MalwarebytesLabs A week in security (October 8 – 14) A roundup of the security news from October 8–14 including breaches, phishing attacks, and hacking tools. Categories: Security world Week in security Tags: (Read more...) ]]> 2018-10-15T15:56:01+00:00 https://blog.malwarebytes.com/security-world/week-in-security/2018/10/week-security-october-8-14/ www.secnews.physaphae.fr/article.php?IdArticle=848422 False None None None Malwarebytes Labs - MalwarebytesLabs Malwarebytes Labs Cybercrime Tactics and Techniques Report (CTNT) shows shift to business targets in Q3 The quarterly Malwarebytes Labs Cybercrime Tactics and Techniques Report is here! Learn how Q3 2018 marked a major turning point in cybercrime trends-especially for businesses. Categories: CTNT report Malwarebytes news Tags: (Read more...) ]]> 2018-10-15T07:01:00+00:00 https://blog.malwarebytes.com/malwarebytes-news/2018/10/labs-cybercrime-tactics-and-techniques-report-ctnt-shows-shift-to-business-targets/ www.secnews.physaphae.fr/article.php?IdArticle=847631 False None None None Malwarebytes Labs - MalwarebytesLabs Workplace violence: the forgotten insider threat Among insider threats, workplace violence could be considered the most dangerous. And yet, the majority of organizations are not prepared. What should they do to protect their employees? Categories: 101 Business Tags: (Read more...) ]]> 2018-10-12T16:00:00+00:00 https://blog.malwarebytes.com/101/2018/10/workplace-violence-the-forgotten-insider-threat/ www.secnews.physaphae.fr/article.php?IdArticle=844297 False Threat None None Malwarebytes Labs - MalwarebytesLabs Fake browser update seeks to compromise more MikroTik routers Threat actors are social engineering users with a fake update that, once installed, will scan the Internet in an attempt to exploit vulnerable MikroTik routers. Categories: Exploits Threat analysis Tags: (Read more...) ]]> 2018-10-12T15:00:00+00:00 https://blog.malwarebytes.com/threat-analysis/2018/10/fake-browser-update-seeks-to-compromise-more-mikrotik-routers/ www.secnews.physaphae.fr/article.php?IdArticle=844187 False None None None Malwarebytes Labs - MalwarebytesLabs 6 ways to keep up with cybersecurity without going crazy As we dive headfirst into National Cyber Security Awareness Month, it seems only fitting to discuss ways to stay on top of cybersecurity news. But what if following along makes you feel a little overwhelmed? Try these six methods of information-gathering to brush up on your cybersecurity know-how without losing your mind. Categories: 101 How-tos Tags: (Read more...) ]]> 2018-10-11T15:00:00+00:00 https://blog.malwarebytes.com/101/2018/10/6-ways-to-keep-up-with-cybersecurity-without-going-crazy/ www.secnews.physaphae.fr/article.php?IdArticle=842479 False None None None Malwarebytes Labs - MalwarebytesLabs Bloomberg blunder highlights supply chain risks A potentially erroneous report from Bloomberg claimed that Chinese spies were able to infiltrate US hardware supplier Supermicro, and therefore, our technology supply chain. Learn how this unverified story could ultimately come true-and what, if anything, can be done to stop it. Categories: Cybercrime Hacking Tags: (Read more...) ]]> 2018-10-10T16:00:00+00:00 https://blog.malwarebytes.com/cybercrime/2018/10/bloomberg-blunder-supply-chain-risks/ www.secnews.physaphae.fr/article.php?IdArticle=840764 False None None None Malwarebytes Labs - MalwarebytesLabs When Endpoint Detection and Response (EDR) is not enough As cybercriminals continue to validate the reality that no security is going to stop every threat every time, companies are turning to endpoint detection and response solutions to close the gap. But is it enough to keep businesses and their data protected? Categories: Malwarebytes news Product updates Tags: (Read more...) ]]> 2018-10-09T15:00:00+00:00 https://blog.malwarebytes.com/malwarebytes-news/2018/10/when-endpoint-detection-and-response-edr-is-not-enough/ www.secnews.physaphae.fr/article.php?IdArticle=838921 False Threat None None Malwarebytes Labs - MalwarebytesLabs Avoid these Doctor Who Series 11 scams Doctor Who Series 11 is upon us, and so too are the dubious streams and links promising fresh content. We take a look at what's currently on offer, separating the spam from the timey-wimey wibbly wobbly. Categories: Cybercrime Social engineering Tags: (Read more...) ]]> 2018-10-08T16:39:03+00:00 https://blog.malwarebytes.com/cybercrime/2018/10/avoid-these-doctor-who-series-11-scams/ www.secnews.physaphae.fr/article.php?IdArticle=836992 False Spam None None Malwarebytes Labs - MalwarebytesLabs A week in security (October 1 – 7) A roundup of the security news from October 1–7 including National Cybersecurity Awareness Month, LoJack, fileless malware, and BYOS. Categories: Security world Week in security Tags: (Read more...) ]]> 2018-10-08T16:31:05+00:00 https://blog.malwarebytes.com/security-world/2018/10/week-security-october-1-7/ www.secnews.physaphae.fr/article.php?IdArticle=836993 False None None None Malwarebytes Labs - MalwarebytesLabs Fileless malware: part deux In part two of this series on fileless malware, our malware analyst walks readers through two demonstrations of fileless malware attacks and shows the problems with detecting them using static signatures. Categories: Malwarebytes news Tags: (Read more...) ]]> 2018-10-05T15:00:00+00:00 https://blog.malwarebytes.com/malwarebytes-news/2018/10/fileless-malware-part-deux/ www.secnews.physaphae.fr/article.php?IdArticle=831996 False Malware None None Malwarebytes Labs - MalwarebytesLabs LoJack for computers used to attack European government bodies Security researchers have detected the first known instance of a UEFI bootkit being used against government bodies in Central and Eastern Europe. The attack relies on a persistence mechanism stolen from a legitimate software called Computrace-essentially LoJack for computers-that comes by default on many machines. Categories: Hacking Tags: (Read more...) ]]> 2018-10-04T15:00:00+00:00 https://blog.malwarebytes.com/cybercrime/hacking/2018/10/lojack-for-computers-used-to-attack-european-government/ www.secnews.physaphae.fr/article.php?IdArticle=830683 False None None None Malwarebytes Labs - MalwarebytesLabs Bring your own security (BYOS): good idea or not? We know about BYOD. What about BYOS? Is it a good idea to Bring Your Own Security, or use your own security solution on devices that you use for work? What if they are company owned? We walk companies and employees through the pros and cons of each. Categories: Business Technology Tags: (Read more...) ]]> 2018-10-02T15:00:00+00:00 https://blog.malwarebytes.com/101/business/2018/10/bring-your-own-security-byos-good-idea-or-not/ www.secnews.physaphae.fr/article.php?IdArticle=830373 False None None None Malwarebytes Labs - MalwarebytesLabs Fortnite gamers targeted by data theft malware If you've ever been tempted to cheat at Fortnite, think again-with the release of season six of the popular video game, we found a data theft malware masquerading as a cheat tool, ready to steal your browser sessions, cookies, and even your Bitcoin. Categories: Cybercrime Malware Tags: (Read more...) ]]> 2018-10-02T14:00:00+00:00 https://blog.malwarebytes.com/cybercrime/2018/10/fortnite-gamers-targeted-by-data-theft-malware/ www.secnews.physaphae.fr/article.php?IdArticle=828488 False Malware None 4.0000000000000000 Malwarebytes Labs - MalwarebytesLabs A week in security (September 24 – 30) A roundup of the security news from September 24–30 including phishing, Apple woes, a vulnerability in the wild, e-commerce attacks, phone spam, and a massive Facebook breach. Categories: Security world Week in security Tags: (Read more...) ]]> 2018-10-01T16:44:02+00:00 https://blog.malwarebytes.com/security-world/2018/10/a-week-in-security-september-24-30/ www.secnews.physaphae.fr/article.php?IdArticle=827122 False Vulnerability None None Malwarebytes Labs - MalwarebytesLabs Malwarebytes is a champion of National Cyber Security Awareness Month As we bid hello to National Cyber Security Awareness Month, we at Malwarebytes not only pledge to provide the best protection for our customers. We also re-commit ourselves to fostering cybersecurity education and awareness for all. Categories: 101 FYI Tags: (Read more...) ]]> 2018-10-01T14:00:03+00:00 https://blog.malwarebytes.com/101/2018/10/malwarebytes-is-a-champion-of-national-cyber-security-awareness-month/ www.secnews.physaphae.fr/article.php?IdArticle=826957 False None None None Malwarebytes Labs - MalwarebytesLabs Millions of accounts affected in latest Facebook hack Facebook announced earlier today that its social network had been breached, resulting in 40 million accounts that were directly impacted. Learn more as the Facebook breach story develops. Categories: Cybercrime Tags: (Read more...) ]]> 2018-09-28T19:39:01+00:00 https://blog.malwarebytes.com/cybercrime/2018/09/millions-of-accounts-affected-in-latest-facebook-hack/ www.secnews.physaphae.fr/article.php?IdArticle=825893 False Hack None None Malwarebytes Labs - MalwarebytesLabs How to protect your data from Magecart and other e-commerce attacks Magecart and other criminal groups are causing mayhem by stealing payment information from e-commerce sites, big and small. Learn how they are doing it and how to mitigate against it. Categories: Cybercrime Hacking Tags: (Read more...) ]]> 2018-09-28T15:00:05+00:00 https://blog.malwarebytes.com/cybercrime/2018/09/how-to-protect-your-data-from-magecart-and-other-e-commerce-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=825894 False None None None Malwarebytes Labs - MalwarebytesLabs Phone spampocalypse: fighting back in the age of unwanted calls US telecommunications companies have the technology to protect customers against the rising tide of unwanted calls-they just haven't done it yet. So it's up to lawmakers and consumers themselves to fight back against phone spampocalypse. Here's how they're doing it. Categories: 101 FYI Tags: (Read more...) ]]> 2018-09-27T18:58:02+00:00 https://blog.malwarebytes.com/101/2018/09/phone-spampocalypse-fighting-back-in-the-age-of-unwanted-calls/ www.secnews.physaphae.fr/article.php?IdArticle=825895 False None None None Malwarebytes Labs - MalwarebytesLabs Buggy implementation of CVE-2018-8373 vulnerability used to deliver Quasar RAT A threat actor implements a newer vulnerability exploited in Internet Explorer to serve up the Quasar RAT and diversify the portfolio of attacks. Categories: Exploits Threat analysis Tags: (Read more...) ]]> 2018-09-26T17:13:02+00:00 https://blog.malwarebytes.com/threat-analysis/2018/09/buggy-implementation-of-cve-2018-8373-used-to-deliver-quasar-rat/ www.secnews.physaphae.fr/article.php?IdArticle=825469 False Vulnerability,Threat None None Malwarebytes Labs - MalwarebytesLabs Holes found in Mojave\'s privacy protection Read more...) ]]> 2018-09-26T15:00:00+00:00 https://blog.malwarebytes.com/security-world/privacy-security-world/2018/09/holes-found-in-mojaves-privacy-protection/ www.secnews.physaphae.fr/article.php?IdArticle=825256 False None None None Malwarebytes Labs - MalwarebytesLabs Safari users: Where did your extensions go? Safari has begun blocking legacy extensions installed from outside the Extensions Gallery. Unfortunately, implementation of this policy has been abrupt, with little explanation for users on why their extensions are being yanked. Let's look at how Apple's new policy and how its application impacts security. Categories: Security world Technology Tags: (Read more...) ]]> 2018-09-25T16:00:00+00:00 https://blog.malwarebytes.com/security-world/2018/09/safari-users-where-did-your-extensions-go/ www.secnews.physaphae.fr/article.php?IdArticle=823907 False None None None Malwarebytes Labs - MalwarebytesLabs 100 channels and nothing on, except TV Licensing phishes A recent bout of TV Licensing phishing emails promise British users a refund once they log in to a phony TV License website and provide payment details. Read on to see if you've been impacted. Categories: Cybercrime Social engineering Tags: (Read more...) ]]> 2018-09-25T09:00:00+00:00 https://blog.malwarebytes.com/cybercrime/2018/09/100-channels-and-nothing-on-except-tv-licensing-phishes/ www.secnews.physaphae.fr/article.php?IdArticle=823274 False None None None Malwarebytes Labs - MalwarebytesLabs Mobile Menace Monday: SMS phishing attacks target the job market Could it be that our dream job awaits via a random SMS message? On the contrary, this SMS phishing attack could cause nightmares for unsuspecting job hunters. Categories: Cybercrime Mobile Tags: (Read more...) ]]> 2018-09-24T17:45:05+00:00 https://blog.malwarebytes.com/cybercrime/2018/09/mobile-menace-monday-sms-phishing-attacks-target-the-job-market/ www.secnews.physaphae.fr/article.php?IdArticle=822543 False None None None Malwarebytes Labs - MalwarebytesLabs A week in security (September 17 – 23) A roundup of the security news from September 17–23, including Android scams, massive WordPress compromises, and high fines for Equifax. Categories: Security world Week in security Tags: (Read more...) ]]> 2018-09-24T17:03:02+00:00 https://blog.malwarebytes.com/security-world/2018/09/week-security-september-17-23/ www.secnews.physaphae.fr/article.php?IdArticle=822488 False None Equifax None Malwarebytes Labs - MalwarebytesLabs Emotet on the rise with heavy spam campaign Over the last few days, we've noticed a large increase in malicious spam spreading Emotet, as well as a higher number of detections from our customers. Looks like we're in the middle of an active Emotet campaign. Categories: Cybercrime Malware Tags: (Read more...) ]]> 2018-09-21T22:55:01+00:00 https://blog.malwarebytes.com/cybercrime/2018/09/emotet-rise-heavy-spam-campaign/ www.secnews.physaphae.fr/article.php?IdArticle=819676 False Spam Wannacry None Malwarebytes Labs - MalwarebytesLabs Simple Authentication and Security Layer (SASL) vulnerabilities The Simple Authentication and Security Layer (SASL) is an essential element of online authentication. But are you aware of all the known vulnerabilities? And, more importantly, have you patched them? Categories: Cybercrime Exploits Tags: (Read more...) ]]> 2018-09-21T15:00:00+00:00 https://blog.malwarebytes.com/cybercrime/2018/09/simple-authentication-and-security-layer-sasl-vulnerabilities/ www.secnews.physaphae.fr/article.php?IdArticle=819230 False None None None Malwarebytes Labs - MalwarebytesLabs Mass WordPress compromises redirect to tech support scams Thousands of WordPress sites have been injected with the same malicious redirection. We review the infection details and the malicious traffic leading to browser lockers. Categories: Social engineering Threat analysis Tags: (Read more...) ]]> 2018-09-20T17:42:04+00:00 https://blog.malwarebytes.com/threat-analysis/2018/09/mass-wordpress-compromises-tech-support-scams/ www.secnews.physaphae.fr/article.php?IdArticle=817955 False Guideline None None Malwarebytes Labs - MalwarebytesLabs 6 sure signs someone is phishing you-besides email Beyond the medium used to reach you (which is most often email), what are some of the common signs and behaviors of phishing? Conversations that focus on the inbox only leave users with an inadequate understanding of how to protect against this ubiquitous threat. Categories: 101 FYI Tags: (Read more...) ]]> 2018-09-20T16:00:00+00:00 https://blog.malwarebytes.com/101/2018/09/6-sure-signs-someone-is-phishing-you-besides-email/ www.secnews.physaphae.fr/article.php?IdArticle=817790 False None None None Malwarebytes Labs - MalwarebytesLabs A month of giveaway spam on Twitter We've observed a low level spam campaign working its way through Twitter, with just under 2,000 posts visible on public search since September 1. What're they trying to sell this time? Some CBD oil! Categories: Cybercrime Privacy Tags: (Read more...) ]]> 2018-09-19T15:00:04+00:00 https://blog.malwarebytes.com/cybercrime/2018/09/month-giveaway-spam-twitter/ www.secnews.physaphae.fr/article.php?IdArticle=815720 False Spam None None Malwarebytes Labs - MalwarebytesLabs A week in security (September 10 – 16) A roundup of the security news from September 10–16, including omnichannel fraud, ways to get back at scammers, the security of 2FA, and partnerstrokas. Categories: Security world Week in security Tags: (Read more...) ]]> 2018-09-17T15:56:01+00:00 https://blog.malwarebytes.com/security-world/2018/09/week-security-september-10-16/ www.secnews.physaphae.fr/article.php?IdArticle=812502 False None None None Malwarebytes Labs - MalwarebytesLabs HMRC phish swipes email login, payment details It isn't tax season for UK (or US) residents, but that hasn't deterred scammers from sending out an HMRC phish double whammy with a tight deadline attached. Categories: Cybercrime Social engineering Tags: (Read more...) ]]> 2018-09-14T16:00:00+00:00 https://blog.malwarebytes.com/cybercrime/2018/09/hmrc-phish-swipes-email-login-payment-details/ www.secnews.physaphae.fr/article.php?IdArticle=808122 False None None None Malwarebytes Labs - MalwarebytesLabs Is two-factor authentication (2FA) as secure as it seems? Two factor authentication (2fa) was introduced to enhance login security, but does it always work as advertised? Or can it be bypassed? Categories: 101 FYI Tags: (Read more...) ]]> 2018-09-14T15:00:00+00:00 https://blog.malwarebytes.com/101/2018/09/two-factor-authentication-2fa-secure-seems/ www.secnews.physaphae.fr/article.php?IdArticle=807995 False None None None Malwarebytes Labs - MalwarebytesLabs Partnerstroka: Large tech support scam operation features latest browser locker Tech support scammers belonging to the Partnerstroka group are once again abusing browsers, this time with a new browlock feature to reel in more victims, in one of the biggest campaigns we've ever tracked. Categories: Cybercrime Social engineering Tags: (Read more...) ]]> 2018-09-13T15:00:00+00:00 https://blog.malwarebytes.com/cybercrime/2018/09/partnerstroka-large-tech-support-scam-operation-features-latest-browser-locker/ www.secnews.physaphae.fr/article.php?IdArticle=806423 False None None None Malwarebytes Labs - MalwarebytesLabs The many faces of omnichannel fraud There's a new kind of fraud out there, and it's after organizations that have embraced omnichannel, a strategy that focuses on improved user experience. We take a look at what omnichannel is, the kinds of fraud that can affect businesses using this approach, and how they can protect themselves-and their clients. Categories: 101 Business Tags: (Read more...) ]]> 2018-09-12T15:00:00+00:00 https://blog.malwarebytes.com/101/2018/09/the-many-faces-of-omnichannel-fraud/ www.secnews.physaphae.fr/article.php?IdArticle=804825 False None None None Malwarebytes Labs - MalwarebytesLabs 5 safe ways to get back at spammers: a guide to wasting time We take a look at some of the safe ways to waste a spammer's time, whether by email or telephone. Categories: 101 How-tos Tags: (Read more...) ]]> 2018-09-11T15:00:00+00:00 https://blog.malwarebytes.com/101/2018/09/5-safe-ways-to-get-back-at-spammers-a-guide-to-wasting-time/ www.secnews.physaphae.fr/article.php?IdArticle=803292 False None None None Malwarebytes Labs - MalwarebytesLabs A week in security (September 3 – 9) A roundup of the security news from September 3 – 9, including spyware going mainstream, Mac App Store apps stealing and abusing customer data, and Fortnite install concerns. Categories: Security world Week in security Tags: (Read more...) ]]> 2018-09-10T16:44:05+00:00 https://blog.malwarebytes.com/security-world/2018/09/a-week-in-security-september-3-september-9/ www.secnews.physaphae.fr/article.php?IdArticle=801898 False None Tesla,Wannacry None Malwarebytes Labs - MalwarebytesLabs Assessing the security of a portable router: a look inside its hardware In this post, we acquire the necessary equipment to analyze the security of an inexpensive portable router, which we access through its diagnostic interface, and poke around inside. Categories: Technology Tags: (Read more...) ]]> 2018-09-10T15:00:00+00:00 https://blog.malwarebytes.com/security-world/technology/2018/09/security-portable-router-inside-hardware/ www.secnews.physaphae.fr/article.php?IdArticle=801759 False None None None Malwarebytes Labs - MalwarebytesLabs Mac App Store apps are stealing user data There are several apps in the Mac App Store that are collecting data about users that they should not be collecting. Here's what you need to know. Categories: Mac Threat analysis Tags: (Read more...) ]]> 2018-09-07T17:08:02+00:00 https://blog.malwarebytes.com/threat-analysis/2018/09/mac-app-store-apps-are-stealing-user-data/ www.secnews.physaphae.fr/article.php?IdArticle=797719 False None None None Malwarebytes Labs - MalwarebytesLabs Fortnite\'s Google Play rebuff sparks security concerns for Android users Read more...) ]]> 2018-09-06T15:00:00+00:00 https://blog.malwarebytes.com/cybercrime/2018/09/fortnite-google-play-rebuff-sparks-security-concerns-for-android/ www.secnews.physaphae.fr/article.php?IdArticle=795490 False None None None Malwarebytes Labs - MalwarebytesLabs When spyware goes mainstream Considering using spyware to surveil a cheating partner or keep an eye on the kiddos? Think again. Not only is it an invasion of privacy, but it's illegal. Learn the telltale signs of spyware and why this suddenly mainstream malware needs to go back underground. Categories: 101 Cybercrime FYI Malware Tags: (Read more...) ]]> 2018-09-05T15:00:00+00:00 https://blog.malwarebytes.com/cybercrime/2018/09/when-spyware-goes-mainstream/ www.secnews.physaphae.fr/article.php?IdArticle=793843 False Malware None None Malwarebytes Labs - MalwarebytesLabs A week in security (August 27 – September 2) A round-up of the security news from August 27 – September 2, including ransomware, interesting talks during BlackHat, botnets, and the evils of JavaScript. Categories: Security world Week in security Tags: (Read more...) ]]> 2018-09-03T15:00:03+00:00 https://blog.malwarebytes.com/security-world/2018/09/week-security-august-27-september-2/ www.secnews.physaphae.fr/article.php?IdArticle=790836 True None None None Malwarebytes Labs - MalwarebytesLabs Explained: regular expression (regex) What is regular expression (regex) and what makes it vulnerable to attack? Learn how to use regex safely and avoid ReDoS attacks in the process. Categories: Business Technology Tags: (Read more...) ]]> 2018-08-31T15:00:05+00:00 https://blog.malwarebytes.com/security-world/technology/2018/08/explained-regular-expression-regex/ www.secnews.physaphae.fr/article.php?IdArticle=787319 False None None None Malwarebytes Labs - MalwarebytesLabs Reversing malware in a custom format: Hidden Bee elements When we recently analyzed payloads related to Hidden Bee (dropped by the Underminer EK), we noticed something unusual. After reversing the malware, we discovered that its authors actually created their own executable format. Follow our step-by-step analysis for a closer look. Categories: Malware Threat analysis Tags: () ]]> 2018-08-30T15:41:03+00:00 https://blog.malwarebytes.com/threat-analysis/2018/08/reversing-malware-in-a-custom-format-hidden-bee-elements/ www.secnews.physaphae.fr/article.php?IdArticle=786124 False Malware None None Malwarebytes Labs - MalwarebytesLabs Fileless malware: getting the lowdown on this insidious threat In this series of articles, we provide an in-depth discussion of fileless malware and their related attacks. In part one, we cover a brief overview of the problems with and general features of fileless malware, laying the groundwork for technical analysis of various samples employing fileless and semi-fileless methods. Categories: Malware Threat analysis Tags: (Read more...) ]]> 2018-08-29T16:48:03+00:00 https://blog.malwarebytes.com/threat-analysis/2018/08/fileless-malware-getting-the-lowdown-on-this-insidious-threat/ www.secnews.physaphae.fr/article.php?IdArticle=784848 False Malware,Threat None 4.0000000000000000 Malwarebytes Labs - MalwarebytesLabs Official Cardi B website plagued by spammers Over the past few days, fans of singer Cardi B noticed her website was slowly filling up with spam. We take a look at what happened. Categories: Cybercrime Privacy Tags: (Read more...) ]]> 2018-08-28T15:00:00+00:00 https://blog.malwarebytes.com/cybercrime/2018/08/official-cardi-b-website-plagued-by-spammers/ www.secnews.physaphae.fr/article.php?IdArticle=782849 False None None None Malwarebytes Labs - MalwarebytesLabs Mobile Menace Monday: FakeGift is the gift that keeps on frustrating Last spring, we found yet another piece of riskware on Google Play we call Android/PUP.Riskware.FakeGift. FakeGift does exactly what its name implies: gives its users fake gifts that can be redeemed for...absolutely nothing. Categories: Cybercrime Mobile Tags: (Read more...) ]]> 2018-08-27T20:29:00+00:00 https://blog.malwarebytes.com/cybercrime/2018/08/mobile-menace-monday-fakegift-is-the-gift-that-gives-frustration/ www.secnews.physaphae.fr/article.php?IdArticle=782850 False None None None Malwarebytes Labs - MalwarebytesLabs A week in security (August 20 – 26) A roundup of the security news from August 20 – 26, including a look at insider threats, several breaches, and what tech giants Google and Facebook are doing about their privacy issues. Categories: Security world Week in security Tags: (Read more...) ]]> 2018-08-27T17:06:01+00:00 https://blog.malwarebytes.com/security-world/week-in-security/2018/08/a-week-in-security-august-20-august-26/ www.secnews.physaphae.fr/article.php?IdArticle=782851 False Medical APT 38 None Malwarebytes Labs - MalwarebytesLabs Green card scams: preying on the desperate Most online scams depend on two things: a legitimate entity that has a complicated or broken process, and a desperate target population. With immigration, you get both, which results in an environment ripe for green card scams. Categories: Cybercrime Social engineering Tags: (Read more...) ]]> 2018-08-24T15:00:00+00:00 https://blog.malwarebytes.com/cybercrime/2018/08/green-card-scams-preying-desperate/ www.secnews.physaphae.fr/article.php?IdArticle=782852 False None None None Malwarebytes Labs - MalwarebytesLabs Can search extensions keep your searches private? A lot of search extensions have been marketed over the year claiming to protect online privacy. Are they worth installing? We take a look at what these plugins actually have to offer. Categories: PUP Tags: (Read more...) ]]> 2018-08-23T15:00:00+00:00 https://blog.malwarebytes.com/puppum/2018/08/can-search-extensions-keep-searches-private/ www.secnews.physaphae.fr/article.php?IdArticle=782853 False None None None Malwarebytes Labs - MalwarebytesLabs Badgelife: A Defcon 26 retrospective Another year, another Defcon. In this retrospective, we take a look at the crown jewel of Defcon swag: badges. Reminisce with us about the coolest badges ever made and traded. Categories: Conferences Security world Tags: (Read more...) ]]> 2018-08-22T16:03:01+00:00 https://blog.malwarebytes.com/security-world/2018/08/badgelife-a-defcon-26-retrospective/ www.secnews.physaphae.fr/article.php?IdArticle=782854 False None None None Malwarebytes Labs - MalwarebytesLabs The digital entropy of death: BSides Manchester What happens to online accounts when we die? Not a cheerful subject by any stretch of the imagination, but one we covered at BSides Manchester. Categories: 101 Tags: (Read more...) ]]> 2018-08-21T15:58:01+00:00 https://blog.malwarebytes.com/101/2018/08/the-digital-entropy-of-death-bsides-manchester/ www.secnews.physaphae.fr/article.php?IdArticle=782855 False None None None Malwarebytes Labs - MalwarebytesLabs A week in security (August 13 – 19) A round up of the security news from August 13 – 19, including an in-depth discussion of what drives the average cybercriminal to crime. Categories: Security world Week in security Tags: (Read more...) ]]> 2018-08-20T17:33:01+00:00 https://blog.malwarebytes.com/security-world/week-in-security/2018/08/a-week-in-security-august-13-august-19/ www.secnews.physaphae.fr/article.php?IdArticle=782504 False None None None Malwarebytes Labs - MalwarebytesLabs The enemy is us: a look at insider threats It could be the engineer in the IT department, the janitor mopping the lobby, one of the many managers two floors up, or the contractor who's been in and out the office for weeks now. Or, maybe it could be you. It could be the engineer in the IT department, the janitor mopping the lobby, one of the many managers two floors up, or the contractor who's been in and out the office for weeks now. Or, maybe it could be you. Who are the insider threats to organizations? And how can they be stopped? Categories: 101 Business Tags: (Read more...) ]]> 2018-08-20T16:42:05+00:00 https://blog.malwarebytes.com/101/2018/08/we-have-met-the-enemy-and-he-is-us-a-look-at-insider-threats/ www.secnews.physaphae.fr/article.php?IdArticle=782505 False Threat None None Malwarebytes Labs - MalwarebytesLabs Liar, liar, pants on fire! Barclays phish claims cards explode We feel compelled to relay the dire warning from this Barclays snail-mail letter, which we acquired through social media, therefore it must be true. Categories: Cybercrime Social engineering Tags: (Read more...) ]]> 2018-08-17T16:00:00+00:00 https://blog.malwarebytes.com/cybercrime/2018/08/liar-liar-pants-fire-barclays-phish-claims-cards-explode/ www.secnews.physaphae.fr/article.php?IdArticle=779613 False None None None Malwarebytes Labs - MalwarebytesLabs How to secure your content management system Popular content management systems are easy to install and use. But how easy is it to keep them secure? Categories: Security world Technology Tags: (Read more...) ]]> 2018-08-16T15:00:00+00:00 https://blog.malwarebytes.com/security-world/technology/2018/08/secure-content-management-system/ www.secnews.physaphae.fr/article.php?IdArticle=779614 False None None None Malwarebytes Labs - MalwarebytesLabs Black Hat USA 2018: ransomware is still the star A recap of the Malwarebytes' team experience at the Black Hat conference in Las Vegas, including top trends, topics, and interesting discussions. Categories: Malwarebytes news Tags: (Read more...) ]]> 2018-08-15T16:00:00+00:00 https://blog.malwarebytes.com/malwarebytes-news/2018/08/black-hat-2018-recap/ www.secnews.physaphae.fr/article.php?IdArticle=779615 False Ransomware None None Malwarebytes Labs - MalwarebytesLabs Under the hoodie: why money, power, and ego drive hackers to cybercrime We know what cybercriminals do. We know how they do it. Now we ask: why? This in-depth profile examines what makes hackers turn to cybercrime, and what could change their minds. Categories: Cybercrime Social engineering Tags: (Read more...) ]]> 2018-08-15T14:00:00+00:00 https://blog.malwarebytes.com/cybercrime/2018/08/under-the-hoodie-why-money-power-and-ego-drive-hackers-to-cybercrime/ www.secnews.physaphae.fr/article.php?IdArticle=779616 False None None None Malwarebytes Labs - MalwarebytesLabs Back to school cybersecurity: hints, tips, and links for a safer school year Term time is upon us once more, and soon the summer holidays will be a thing of the past. We offer up some handy hints and tips for better back to school cybersecurity, and link to numerous resources of our own to help parents and kids have a safer online experience this year. Categories: 101 FYI Tags: (Read more...) ]]> 2018-08-14T15:00:00+00:00 https://blog.malwarebytes.com/101/2018/08/back-to-school-hints-tips-and-links/ www.secnews.physaphae.fr/article.php?IdArticle=779617 False None None None Malwarebytes Labs - MalwarebytesLabs Process Doppelgänging meets Process Hollowing in Osiris dropper Process doppleganging, a rare technique of impersonating a process, was discovered last year, but hasn't been seen much in the wild since. It was an interesting surprise, then, to discover its use mixed in with Process Hollowing, yet another technique, in a dropper for the Osiris banking Trojan. Categories: Malware Threat analysis Tags: (Read more...) ]]> 2018-08-13T18:29:05+00:00 https://blog.malwarebytes.com/threat-analysis/2018/08/process-doppelganging-meets-process-hollowing_osiris/ www.secnews.physaphae.fr/article.php?IdArticle=779618 True None None None Malwarebytes Labs - MalwarebytesLabs A week in security (August 6 – August 12) A round-up of the security news from August 6 – August 12, including ransomware, interesting talks during BlackHat, botnets, and the evils of JavaScript. Categories: Security world Week in security Tags: (Read more...) ]]> 2018-08-13T16:37:01+00:00 https://blog.malwarebytes.com/security-world/2018/08/week-security-august-6-12/ www.secnews.physaphae.fr/article.php?IdArticle=779619 False None None None Malwarebytes Labs - MalwarebytesLabs How to protect your RDP access from ransomware attacks Ransomware distributors have started using RDP to gain access to business networks. Do you have your remote desktops under control? Categories: Business Security world Tags: (Read more...) ]]> 2018-08-10T16:13:01+00:00 https://blog.malwarebytes.com/security-world/business-security-world/2018/08/protect-rdp-access-ransomware-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=775348 False Ransomware None None Malwarebytes Labs - MalwarebytesLabs Osiris dropper found using process doppelgänging Process doppleganging, a rare technique of impersonating a process, was discovered last year, but hasn't been seen much in the wild since. It was an interesting surprise, then, to discover its use in a dropper of the Osiris banking Trojan. We unpack the code to show how malware authors used this process. Categories: Malwarebytes news Tags: (Read more...) ]]> 2018-08-09T18:52:05+00:00 https://blog.malwarebytes.com/malwarebytes-news/2018/08/osiris-using-process-doppelganging/ www.secnews.physaphae.fr/article.php?IdArticle=773788 False Malware None None Malwarebytes Labs - MalwarebytesLabs 8 everyday technologies that can make you vulnerable to cyberattacks The security vulnerabilities of the latest developments in tech have been well documented. But what about everyday technologies that have been around for a while or are widely adopted? Here are eight commonly-used tech conveniences that are not as ironclad as you might hope. Categories: 101 FYI Tags: (Read more...) ]]> 2018-08-09T15:00:00+00:00 https://blog.malwarebytes.com/101/2018/08/8-everyday-technologies-that-can-make-you-vulnerable-to-cyberattacks/ www.secnews.physaphae.fr/article.php?IdArticle=773374 False None None None Malwarebytes Labs - MalwarebytesLabs White hat, black hat, and the emergence of the gray hat: the true costs of cybercrime Osterman Research recently completed a major survey on behalf of Malwarebytes to determine the actual cost of cybercrime to businesses. Here's what we discovered. Categories: Business Security world Tags: (Read more...) ]]> 2018-08-08T14:00:00+00:00 https://blog.malwarebytes.com/security-world/2018/08/white-hat-black-hat-emergence-gray-hat-true-costs-cybercrime/ www.secnews.physaphae.fr/article.php?IdArticle=771206 False None None None Malwarebytes Labs - MalwarebytesLabs Exploit kits: summer 2018 review Just like the beach, the EK landscape got a little crowded this summer. Find out what we discovered in our exploit kits summer review. Categories: Exploits Threat analysis Tags: (Read more...) ]]> 2018-08-07T15:00:00+00:00 https://blog.malwarebytes.com/threat-analysis/2018/08/exploit-kits-summer-2018-review/ www.secnews.physaphae.fr/article.php?IdArticle=769806 False None None None Malwarebytes Labs - MalwarebytesLabs A week in security (July 30 – August 5) A roundup of the security news from July 30 – August 5, including cryptomining, big data, social engineering, and more. Categories: Security world Week in security Tags: (Read more...) ]]> 2018-08-06T16:07:03+00:00 https://blog.malwarebytes.com/security-world/2018/08/week-security-july-30-august-5/ www.secnews.physaphae.fr/article.php?IdArticle=768271 False None None None Malwarebytes Labs - MalwarebytesLabs Explained: What is big data? In our explained series, we talk about the impact of big data on our society. What is it, who uses it, and for what purposes? Categories: Security world Technology Tags: (Read more...) ]]> 2018-08-03T15:00:00+00:00 https://blog.malwarebytes.com/security-world/technology/2018/08/explained-what-is-big-data/ www.secnews.physaphae.fr/article.php?IdArticle=765255 False None None None Malwarebytes Labs - MalwarebytesLabs Social engineering attacks: What makes you susceptible? Cybercriminals will do what it takes to get what they want, whether that's breaching a corporate network or stealing credentials with malware. But what do we do if hackers are hacking us instead of our computers? Here's how to tell if you're susceptible to social engineering attacks, and what to do to combat them. Categories: Cybercrime Social engineering Tags: (Read more...) ]]> 2018-08-02T15:00:00+00:00 https://blog.malwarebytes.com/cybercrime/social-engineering-cybercrime/2018/08/social-engineering-attacks-what-makes-you-susceptible/ www.secnews.physaphae.fr/article.php?IdArticle=763804 False None None None Malwarebytes Labs - MalwarebytesLabs What\'s in the spam mailbox this week? Read more...) ]]> 2018-07-31T15:00:02+00:00 https://blog.malwarebytes.com/cybercrime/2018/07/whats-spam-mailbox-week/ www.secnews.physaphae.fr/article.php?IdArticle=760642 False Spam None None Malwarebytes Labs - MalwarebytesLabs A week in security (July 23 – July 29) A round up of the security news from July 23 – July 29, including the introduction of Malwarebytes Browser Extensions, and new malware HiddenBee, Proton, and MobiDash. Categories: Security world Week in security Tags: (Read more...) ]]> 2018-07-30T15:57:01+00:00 https://blog.malwarebytes.com/security-world/2018/07/a-week-in-security-july-23-july-29/ www.secnews.physaphae.fr/article.php?IdArticle=759097 False Malware None None Malwarebytes Labs - MalwarebytesLabs New Android P includes several security improvements With its release around the corner, we take a close look at the Android P security improvements and how the newest version of Android will better protect the privacy and data of its users. Categories: Cybercrime Mobile Tags: (Read more...) ]]> 2018-07-27T19:12:02+00:00 https://blog.malwarebytes.com/cybercrime/2018/07/mobile-menace-monday-android-p-security-improvements/ www.secnews.physaphae.fr/article.php?IdArticle=757170 False None None None Malwarebytes Labs - MalwarebytesLabs \'Hidden Bee\' miner delivered via improved drive-by download toolkit Threat actors switch to the Hidden Bee miner as a payload for this unusual and complex drive-by download campaign. Categories: Exploits Threat analysis Tags: (Read more...) ]]> 2018-07-26T21:00:02+00:00 https://blog.malwarebytes.com/threat-analysis/2018/07/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit/ www.secnews.physaphae.fr/article.php?IdArticle=755486 False None None None Malwarebytes Labs - MalwarebytesLabs Introducing: Malwarebytes Browser Extension Malwarebytes Browser Extensions (BETA) are available in the official web stores for Chrome and Firefox. Read what they can do for you, and try one, if you haven't already.. Categories: Betas Malwarebytes news Tags: (Read more...) ]]> 2018-07-26T17:21:02+00:00 https://blog.malwarebytes.com/malwarebytes-news/betas/2018/07/introducing-malwarebytes-browser-extension/ www.secnews.physaphae.fr/article.php?IdArticle=755098 False None None None Malwarebytes Labs - MalwarebytesLabs Trojans: What\'s the real deal? Read more...) ]]> 2018-07-25T15:40:04+00:00 https://blog.malwarebytes.com/cybercrime/2018/07/trojans-whats-the-real-deal/ www.secnews.physaphae.fr/article.php?IdArticle=753219 False None None None Malwarebytes Labs - MalwarebytesLabs New strain of Mac malware Proton found after two years A new variant of the Mac malware Proton, which was rampant on macOS last year, has been found dating back to at least two years ago. Learn how this could still affect your Mac today. Categories: Mac Threat analysis Tags: (Read more...) ]]> 2018-07-24T15:00:00+00:00 https://blog.malwarebytes.com/threat-analysis/2018/07/new-strain-of-mac-malware-found-after-two-years/ www.secnews.physaphae.fr/article.php?IdArticle=751351 False Malware None None Malwarebytes Labs - MalwarebytesLabs A week in security (July 16 – July 22) A round up of the security news from July 16 – July 22, including the release of our quarterly Cybercrime tactics and techniques report, breaches, airport security, bug bounties, and more. Categories: Security world Week in security Tags: (Read more...) ]]> 2018-07-23T17:30:00+00:00 https://blog.malwarebytes.com/security-world/2018/07/week-security-july-16-july-22/ www.secnews.physaphae.fr/article.php?IdArticle=749774 False None None None Malwarebytes Labs - MalwarebytesLabs Mobile Menace Monday: Adware MobiDash gets stealthy Adware MobiDash, an ad-displaying nuisance, now comes with some additional stealth features. As a result, these features hide the existence of Adware MobiDash-even when it's in plain sight. Categories: Cybercrime Mobile Tags: (Read more...) ]]> 2018-07-23T15:00:05+00:00 https://blog.malwarebytes.com/cybercrime/2018/07/mobile-menace-monday-adware-mobidash-gets-stealthy/ www.secnews.physaphae.fr/article.php?IdArticle=749541 False None None None Malwarebytes Labs - MalwarebytesLabs The danger of third parties: ads, pipelines, and plugins We take a look at the perils of the tools and services embedded into the websites you use on a daily basis, thanks to the development help of third parties. Categories: 101 FYI Tags: (Read more...) ]]> 2018-07-20T15:00:00+00:00 https://blog.malwarebytes.com/101/2018/07/third-party-dangers-ads-pipelines-and-plugins/ www.secnews.physaphae.fr/article.php?IdArticle=747498 False None None None Malwarebytes Labs - MalwarebytesLabs How to block ads like a pro In part one of this series, we had a look at a few reasons why you should block ads on your network and devices. In the second part, we'll cover a few of the common ad blocking utilities and how to best configure those tools for maximum effectiveness. Categories: Privacy Security world Tags: (Read more...) ]]> 2018-07-19T17:24:03+00:00 https://blog.malwarebytes.com/security-world/2018/07/how-to-block-ads-like-a-pro/ www.secnews.physaphae.fr/article.php?IdArticle=747499 False None None None Malwarebytes Labs - MalwarebytesLabs What\'s the real value-and danger-of smart assistants? Read more...) ]]> 2018-07-18T20:24:04+00:00 https://blog.malwarebytes.com/security-world/2018/07/whats-the-real-value-and-danger-of-smart-assistants/ www.secnews.physaphae.fr/article.php?IdArticle=747500 False None None None Malwarebytes Labs - MalwarebytesLabs 5 ways to find and fix open source vulnerabilities A recent discovery of surreptitious execution of cryptomining code by a sandboxed app, riding piggyback on the open source software (OSS) ecosystem, raises pertinent questions about open source vulnerabilities. Here are five ways developers can find and fix vulnerabilities and their dependencies. Categories: Business Security world Tags: (Read more...) ]]> 2018-07-17T15:00:00+00:00 https://blog.malwarebytes.com/security-world/2018/07/5-ways-find-fix-open-source-vulnerabilities/ www.secnews.physaphae.fr/article.php?IdArticle=747501 False None None None Malwarebytes Labs - MalwarebytesLabs Cybercrime tactics & techniques Q2 2018 The last quarter is likely the last hurrah of the campaigns and attacks we've been seeing over the last 6 months. What comes next may completely change the game. Check out our latest Cybercrime Tactics & Techniques report to find out more about what you may encounter next quarter. Categories: CTNT report Tags: (Read more...) ]]> 2018-07-17T12:05:00+00:00 https://blog.malwarebytes.com/malwarebytes-news/ctnt-report/2018/07/cybercrime-tactics-techniques-q2-2018/ www.secnews.physaphae.fr/article.php?IdArticle=747502 False None VPNFilter None Malwarebytes Labs - MalwarebytesLabs Magniber ransomware improves, expands within Asia After a controlled delivery focused on South Korea, an upgraded Magniber ransomware is now affecting other Asian countries. Categories: Exploits Threat analysis Tags: (Read more...) ]]> 2018-07-16T17:00:01+00:00 https://blog.malwarebytes.com/threat-analysis/2018/07/magniber-ransomware-improves-expands-within-asia/ www.secnews.physaphae.fr/article.php?IdArticle=747503 False Ransomware None None Malwarebytes Labs - MalwarebytesLabs A week in security (July 9 – July 15) A roundup of the security news from July 9 - July 15, including sextortion, Spectre, cryptomining, mobile malware, ICO scams and more. Categories: Security world Week in security Tags: (Read more...) ]]> 2018-07-16T15:00:00+00:00 https://blog.malwarebytes.com/security-world/week-in-security/2018/07/week-security-july-9-july-15/ www.secnews.physaphae.fr/article.php?IdArticle=747504 False None None None Malwarebytes Labs - MalwarebytesLabs A primer: How to stay safe on Amazon\'s Prime Day Sale 2018-07-15T17:34:05+00:00 https://blog.malwarebytes.com/101/2018/07/primer-stay-safe-amazons-prime-day-sale/ www.secnews.physaphae.fr/article.php?IdArticle=747294 False None None None Malwarebytes Labs - MalwarebytesLabs Block all or nothing to prevent ICO fraud? Unfortunately, most ICOs (Initial Coin Offerings) turn out to be scams. So we feel compelled to ask our customers: would you like us to protect you from aal of them? Categories: Security world Technology Tags: (Read more...) ]]> 2018-07-12T17:00:04+00:00 https://blog.malwarebytes.com/security-world/2018/07/block-all-or-nothing-to-prevent-ico-fraud/ www.secnews.physaphae.fr/article.php?IdArticle=742250 False None None None Malwarebytes Labs - MalwarebytesLabs We block shady ad blockers Some of you have reached out to us concerning Malwarebytes blocking of certain Ad blocking extensions, or an influx in web blocking notifications.  First things first, this is not a False Positive.  Categories: Cybercrime Tags: (Read more...) ]]> 2018-07-11T18:15:02+00:00 https://blog.malwarebytes.com/cybercrime/2018/07/we-block-shady-ad-blockers/ www.secnews.physaphae.fr/article.php?IdArticle=740605 False None None None Malwarebytes Labs - MalwarebytesLabs IoT domestic abuse: What can we do to stop it? A disturbing new use of technology against loved ones has come to light: Internet of Things (IoT) domestic abuse cases are being reported, and security experts are wondering how best to tackle this new problem. What is it? And more importantly, what can we do to fight it? Categories: Cybercrime Privacy Tags: (Read more...) ]]> 2018-07-11T15:00:00+00:00 https://blog.malwarebytes.com/cybercrime/2018/07/iot-domestic-abuse-can-stop/ www.secnews.physaphae.fr/article.php?IdArticle=740367 False None None None Malwarebytes Labs - MalwarebytesLabs So you\'ve been asked to start a threat intel program Read more...) ]]> 2018-07-10T15:00:00+00:00 https://blog.malwarebytes.com/101/business/2018/07/youve-asked-start-threat-intel-program/ www.secnews.physaphae.fr/article.php?IdArticle=738829 False Threat None None Malwarebytes Labs - MalwarebytesLabs A week in security (July 2 – July 8) A roundup of the security news from July 2 - July 8, including a macro-less infection tecnique, online project management tools and crypto-mining malware campaigns. Categories: Security world Week in security Tags: (Read more...) ]]> 2018-07-09T17:00:00+00:00 https://blog.malwarebytes.com/security-world/week-in-security/2018/07/week-security-july-2-july-8/ www.secnews.physaphae.fr/article.php?IdArticle=737496 False Malware None None Malwarebytes Labs - MalwarebytesLabs Everybody and their mother is blocking ads, so why aren\'t you? 2018-07-09T15:00:00+00:00 https://blog.malwarebytes.com/security-world/privacy-security-world/2018/07/mother-is-blocking-ads-so-why-arent-you/ www.secnews.physaphae.fr/article.php?IdArticle=737383 False None None None